Analyzing the Public Outrage at the Delhi Bus Rape Inspired Fashion Shoot


We certainly need to address this problem on all levels – irrespective of culture, location and origin. Everyone is appalled by the news coming out of India.
We are shocked to learn the total savagery of attacks carried out against women and the total inadequacy of law enforcement agencies who ought to prevent such incidents.
The whole world is watching how Indian authorities deal with this problem.


Raj Shetye’s fashion photo shoot (see below), which appears to be motivated by the brutal 2012 gang rape and assault on a woman on a Delhi bus, has angered many in India and around the world.

click hereIn an interview with The Voice of the Cape (South Africa), the 50 Million Missing founder, Rita Banerji explains why she is not surprised by Shetye’s project. However Rita also says, it is equally important to analyze the public rage and question what it really represents. She observes that rape seems to touch a public nerve in India in a way that no other form of lethal violence on women or girls does, and goes on to discuss why this is because it’s still seen through a prism that views women as sexual resources owned by men. Synopsis below [To hear the full 15 min. interview click on the box above].

View original 569 more words

Herb and Spice of the Week – Annatto


Annatto – Spice of the week

Originally posted on My Meals are on Wheels:

Open fruit of the achiote tree

Open fruit of the achiote tree

Annatto, sometimes called roucou or achiote, is derived from the seeds of the achiote trees of tropical and subtropical regions around the world. The seeds are sourced to produce a carotenoid-based yellow to orange food coloring and flavor. Its scent is described as “slightly peppery with a hint of nutmeg” and flavor as “slightly nutty, sweet and peppery”.
In commercial processing, annatto coloring is extracted from the reddish pericarp which surrounds the seed of the achiote (Bixa orellana L.). Historically, it has been used as coloring in many cheeses (e.g., Cheddar, Gloucester, Red Leicester), cheese products (e.g. American cheese, Velveeta), and dairy spreads (e.g. butter, margarine). Annatto can also be used to color a number of non-dairy foods such as rice, custard powder, baked goods, seasonings, processed potatoes, snack foods, breakfast cereals and smoked fish. It has been linked to cases of food-related allergies.

View original 834 more words

Wenn eine Mikrowelle läuft, sollten Sie das Weite suchen


Thought I d share this with you.
You can easy translate with google, but here so much :
‘ When a microwave is on, you should get far away ‘ …
I never liked it right from the start, never bought one too.
Imagine all those who didn’t know and eat their food, daily, warmed with the machine. Imagine ..

Originally posted on PRAVDA TV - Live The Rebellion:


Jeder auf der Welt weiß, dass Mikrowellenherde das Essen bestrahlen, Nährstoffe vernichten und gesundheitsschädlich sind – doch die meisten nehmen das der Bequemlichkeit halber in Kauf.

In 90 Prozent der Haushalte in den USA und weltweit und in fast allen »Hinterzimmern« von Büros findet sich deshalb eine »Mikro« (Strahlenofen). Eine Mikrowelle zu besitzen, ist fast genauso alltäglich wie der Besitz eines Fernsehgeräts.

Kaum jemand weiß, dass sich Metalle im Körper, beispielsweise Zahnfüllungen, aus-dehnen und zu chronischen Schmerzen und Schädigungen führen können, an die niemand denkt, auch die Ärzte nicht. Und wenn sich diese Metalle ausdehnen, können sie Giftstoffe wie Quecksilber freisetzen und ins Blut abgeben. Das sollte nachdenklich machen.

Wo stehen Sie, wenn etwas in der Mikrowelle gart? Wie nahe sind Sie dem Gerät? Warten Sie die letzten 20 bis 30 Sekunden direkt vor der Tür, um sie zu öffnen, als wäre das Gerät sicher, solange die Tür geschlossen ist?…

View original 943 more words



The TAO unit is, for all intents and purposes, a hacking group. The TAO aims to exploit hardware and software to gather intelligence on supposedly foreign entities. This is facilitated by gaining access to telecommunication companies that operate the backbone of the Internet and capturing Internet traffic, as well as intercepting physical devices and inserting monitoring capabilities onto them. Since its inception in 1998, the group has grown to be one of the most important parts of the NSA because of society’s reliance on computers and the access necessary to monitor those communications. The TAO unit was designed to extend previous capabilities for monitoring radio communications to general monitoring of a broad array of networked systems. Since a potential target could be using practically any technology, the TAO unit likely targets network equipment because of the limited number of devices to attack and the broad access it could offer.

In the now infamous files leaked by former NSA contractor Edward Snowden, details of the TAO unit’s tasks, capabilities and functions were released to the general public. For example, the documents exposed information concerning how to compromise systems before they leave the manufacturer, even if they are never connected to a TCP/IP network and other scenarios. Some of the concepts believed to be pioneered by TAO have since been used in credit card skimmer attacks and even USB-based malware. Additionally, there have been many examples of hardware or software shipped with malware already installed and instances of vendors shipping devices where even the most basic security evaluations were not undertaken. While enterprises should plan for and defend against these threats, they must first know how to accomplish it.

The NSA has interrupted the supply chain in attacks so that its monitoring tools will already be present on systems before the devices even connect to a target network. Unfortunately, the supply chain weaknesses are not well understood by enterprises and most are ill-prepared to address hardware that has physical tools already installed on them for intelligence gathering. The physical tool could just send communications to an outside party or it could be used to provide persistence even if the currently installed OS is removed.

While enterprises could reinstall factory operating systems, it is advisable to monitor newly installed systems for any suspicious network access prior to putting them into the production environment.

The reports detailing the NSA’s capabilities are both good and bad: not only do they give the good guys hints about areas to investigate, but they also provide insight for the bad guys and potentially help them shorten the development cycle of future attacks. In regard to man-in-the-middle attacks, the TAO’s QUANTUM program offers fascinating detail on how a communication channel can be monitored, even if the communication channel is encrypted. Enterprises should be aware that attackers outside the NSA are likely hard at work refining the techniques on the QUANTUM capabilities list and will soon seek to apply them to their own targeted attacks — this may already be happening.

Defending TAO techniques: What can be done?

One of the most valuable after effects of the leaks has been giving individuals and enterprises alike the knowledge of where particular technologies and processes, such as network communications and supply chains, are vulnerable to creative attack methods. This should certainly help enterprises prioritize resource allocation toward the defense measures that are needed to prevent falling prey to these issues.

While defending against the NSA itself as a U.S. company simply isn’t feasible, enterprises do have some options. Prior to adopting new hardware or software, enterprises should validate it for tampering. On the other hand, vendors could also provide customers with a method to validate that software and hardware hasn’t been tampered with, such as using signed software. These same steps could be used on a regular basis to look for suspicious activity.

It is also important that enterprises and individuals assume any and all communication is being monitored, even on dedicated circuits. Implementing encryption for all communications beyond merely using a VPN will help thwart tapping and eavesdropping. Enterprises with high security requirements could even protect against attacks using wireless communications through a Faraday cage, though it is unreasonable for most organizations. Alternately, enterprises could get a radio frequency monitor to sweep through their facilities and monitor for unauthorized connections. This is similar to monitoring the network for any suspicious network connections.

In addition to presuming that all lines of communication are being monitored, enterprises could also heed some of the NSA’s own advice around assuming that their businesses are also compromised. It can help keep organizations on their toes if they think they are being targeted by better funded, smarter and more advanced attackers.